Held: Jun 24 2010 11:00 am
Presenting: Robert Shiveley, Mission-Critical Platform Marketing Manager, Data Center
Over the past decade dramatic changes have been taking place in the datacenter. Long gone are the days when Sun was the "dot" in .com and companies were scrambling to put in place e-Commerce strategies and place their businesses on the Internet super highway.
Held: Jun 24 2010 12:00 pm
Presenting: Daniel A. Dec; Fusion Risk Management, SVP, Information Security
This presentation will discuss the challenges and benefits of developing and managing an Operational Risk Management Program (ORMP).
Held: Jun 24 2010 3:00 pm
Presenting: Matt Dieckman; SonicWALL, Product Manager
At the beginning of this 2010, the harsh winter storms raging across the US brought many businesses to their knees - including even the most prepared of organizations like the Federal Government.
Held: Jun 24 2010 5:00 pm
Presenting: Frank Leonetti, Oracle Professional Services, Practice Manager: BC/DR
Frank has been a featured and keynote speaker at several North American conferences including: DRJ, DRIE, CPM, CIO Forum, InfoWorld, Marcus Evans BC/Security Conference and several ACP events.
This session will explore how the global marketplace and current business environment is impacting companies of all sizes through competitive and regulatory pressures. The discussion will cover how an outsourced/managed PCI solution can help companies address their compliance challenges and improve business performance.
Recorded: 28 Jan 2010
Presenting: Dennis Boas, Security Solutions, Enterasys Networks
Abstract: In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.
Recorded: 13th Oct 2009
Presenting: Brian Fish & Dorian J. Cougias. Moderator: Brandon Dunlap.
Recorded: Sept 11th 2009
Presenting: Mark Diamond, President & CEO,Contoural, Nate Fitzgerald, Product Manager of Message Archiving, MX Logic
When: Jun 24 2010 10:00 am
Presenting: Colin Ive, Principal Consultant, CoDRIM
When: Jun 24 2010 9:00 am
Presenting: Stephan Haux, Senior Product Manager EMEA, Iron Mountain
Every IT application protected by Business Continuity (BC) plans needs to include backup. In any BC plan, backup itself must be protected with at least high a level as the application if is supposed to protect.
When: Jun 24 2010 8:00 am
Presenting: Vicki Gavin, Head of Business Continuity, The Economist Group
When: Jun 24 2010 6:00 am
Presenting: Jorge Sebastiao, BD Manager Managed Service, ICT & InfoSec Guru
With over 25 years of "Information and Communication Technology"-ICT experience, covering, managed services, outsourcing, security, business continuity, disaster recovery, vendor management, networking, infrastructure management, virtualization financial sector and telecom.
When: Jun 11 2010 10:00 am
Presenting: Martin Palmgren, IT Strategy & Transformation Executive of .COMMUNICATE.
Martin Palmgren is a senior consultant of Swedish origins and the IT Strategy & Transformation Executive of .COMMUNICATE. Engage live with Martin as he presents "Run IT as a Service Business".
When: Jun 10 2010 4:00 pm
Presenting: Ian Clayton, Principal, Service Management
Join Ian Clayton as he deciphers the myths and uncovers the truths of Service Portfolio Management
When: Jun 10 2010 12:00 pm
Presenting: Dhiraj Gupta, Professional in Service Management
In this presentation, Dhiraj presents a thorough analysis of current patterns and emerging trends in ITSM Implementations. Specifically, Dhiraj discusses the reasons ITSM implementations are initiated, where ITSM lives within the IT organizations, the structure of the team delivering the project and various models for implementation.
When: Jun 10 2010 9:00 am
Presenting: Linh Ho, Director of Product Marketing, OpTier
With many traditional monitoring and management tool solutions on the market today, IT professionals are left holding the bag on how to piece together the solutions to deliver the data they need. And now new technologies are changing the way you manage IT and what you should expect from IT management solutions.
When: Jun 10 2010 4:00 am
Presenting: Howard Kendall, SDI Europe; Don Page, Marval Group, Louise McDonald, Swinton Group
Getting the right people, creating the culture where you are keeping them motivated, business relevant, informed, continually improving and cost effective, is only truly viable with the development of service based skills and understanding across IT Services.
When: Jun 24 2010 2:00 pm
Presenting: David Hutcheson, Managing Director, Glen Abbot Ltd
This presentation will give clear and practical advice on how to run an incident, what to make sure your Incident Management plan covers and how to pick your team.
Short Summary: In this 12-minute podcast, Chris Noell, TruArx EVP of Product Management, discusses the five most common pitfalls when managing a successful and effective compliance program.
Recorded: 7 April 2010
Presenting: Michael Rasmussen, Corporate Integrity; Chris Meritt, Lumension
Safeguarding electronic protected health information (ePHI) has proved quite challenging for many healthcare organizations. In fact, 80 percent of responding healthcare organizations had experienced at least one incident of lost or stolen electronic health information in the past year*.
When: Jun 04 2010 8:00 am
Presenting: Sebastien Giora, French Chapter Leader, OWASP
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.
When: Jun 03 2010 2:00 pm
Presenting: Dow A. Williamson; SCIPP International, Executive Director, CISSP, CSSLP
From "start-up" through "acquisition & development", "implementation", and "operations & maintenance" to "decommissioning", it's far too easy to lay the responsibility for the secure software life cycle at the feet of the application developers.
When: Jun 03 2010 12:00 pm
Presenting: Michael Coates; Mozilla, Web Security Engineer
Michael has extensive experience in application security, security code review and penetration assessments. He has conducted numerous security assessments for financial, enterprise and cellular customers world-wide.
When: Jun 03 2010 4:00 am
Presenting: Justin Clarke, UK Chapter Leader, OWASP
One of the core difficulties in ensuring your organisation's software development process (whether in-house or outsourced) builds in an appropriate level of security is a lack of research, standards and accepted practice in this area.